Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

KaZaA users brace for hijack (more than a million PCs could be hijacked)
Sydney Morning Herald ^ | April 30 2002 | Nathan Cochrane

Posted on 04/30/2002 12:15:09 PM PDT by dead

click here to read article


Navigation: use the links below to view more comments.
first previous 1-2021-4041-45 next last
To: HairOfTheDog
bump
21 posted on 04/30/2002 12:59:22 PM PDT by billbears
[ Post Reply | Private Reply | To 20 | View Replies]

Comment #22 Removed by Moderator

To: Huck
I just downloaded Grokster, and for all intents and purposes, it looks and functions EXACTLY as KaZaA. I wonder if the two are are one in the same?
23 posted on 04/30/2002 1:15:25 PM PDT by X-USAF
[ Post Reply | Private Reply | To 3 | View Replies]

To: all
Thanks for all the information on this thread.

I have alot of clean-up ahead.

24 posted on 04/30/2002 1:29:47 PM PDT by dead
[ Post Reply | Private Reply | To 23 | View Replies]

To: sandyeggo;Penny1;JenB
Glad it worked for you! I followed those instructions and also got Kazaa off my machine. (After getting the file I was there for of course)

Hehehehe. And therein lies the rub. I have only a teensy bit of pity for any of us that were troubled by this little gremlin... After all, there is no free lunch. Or, if you hang out with theives, don't be surprised when they try to steal from you, too.

I knew when I walked into the dark smoky room that is KazAa looking for an illegal stolen bootleg of a popular fantasy film not yet available on DVD... That I had left the moral high ground and was now swimming with alligators. Let is be a lesson to us all!

Go forth and sin no more!

At least until spring 2003, when another popular fantasy film shall hit the bootleg underground and tempt us to return... whispering rationalizations in our ears as we stand outside the door, wanting very much to go back into that place just one more time....

25 posted on 04/30/2002 1:30:15 PM PDT by HairOfTheDog
[ Post Reply | Private Reply | To 22 | View Replies]

To: all
If you use Ad-Aware, make sure you also download and frequently run RefUpdate. Here's the description from download.com:

Makes sure you always have the most recent referencefile for Ad-aware installed on your system. RefUpdate is a free add-on for Lavasoft's Ad-aware that automatically downloads and installs the latest adware definitions on your system. If no reference file can be located, the most recent file will always be downloaded and installed.
Note: You need to have Ad-aware installed on your system before you can use this free add-on.

26 posted on 04/30/2002 1:47:27 PM PDT by Tree of Liberty
[ Post Reply | Private Reply | To 25 | View Replies]

To: X-USAF
I believe they're both clients on the same network, called FastTrack. Morpheus used to be on FastTrack, but there were some licensing feudes, so it moved over to the Gnutella network.
27 posted on 04/30/2002 1:49:19 PM PDT by Tree of Liberty
[ Post Reply | Private Reply | To 23 | View Replies]

To: IoCaster
bump for later
28 posted on 04/30/2002 1:52:31 PM PDT by Huck
[ Post Reply | Private Reply | To 11 | View Replies]

To: Dick Vomer
if you remove the required .dll files from Kazaa, the program becomes disabled. Uninstall Kazaa, Morpheus, BearShare, LimeWire, Gator, and any other file sharing/known spyware program, then run the AdWare program I linked in my earlier post on this thread. THEN, run that program, and delete any adware/spyware it finds. Then you can download, install and ENJOY Kazaa Lite.

regards,

29 posted on 04/30/2002 1:52:35 PM PDT by Benson_Carter
[ Post Reply | Private Reply | To 18 | View Replies]

To: dead
I'm happy with WinMX, try it out.
30 posted on 04/30/2002 1:53:45 PM PDT by Schakaljager
[ Post Reply | Private Reply | To 4 | View Replies]

To: Tree of Liberty
Do you know if the Trojan Horse issue with KaZaA also applies to Grokster?
31 posted on 04/30/2002 1:55:48 PM PDT by X-USAF
[ Post Reply | Private Reply | To 27 | View Replies]

To: Benson_Carter
BearShare isn't spyware, itself. At installation, it asks if you want to install Gator, and some other programs which are spyware, though. You just need to be diligent and read each screen as you're setting it up.
32 posted on 04/30/2002 1:55:51 PM PDT by Tree of Liberty
[ Post Reply | Private Reply | To 29 | View Replies]

To: X-USAF
I'm not sure if the distributed computing thing is in Grokster, but it does contain other spyware. This link will tell you how to clean them out and still keep Grokster working.

I've got Kazaa-lite (which is on the same network as Grokster) on my system, and I couldn't find any of the distributed computing files listed above after I installed it. Here's a Wired article about it.

33 posted on 04/30/2002 2:01:52 PM PDT by Tree of Liberty
[ Post Reply | Private Reply | To 31 | View Replies]

To: Tree of Liberty
Thank you very much for your assistance!
34 posted on 04/30/2002 2:12:03 PM PDT by X-USAF
[ Post Reply | Private Reply | To 33 | View Replies]

To: Marine Inspector
bttt
35 posted on 04/30/2002 2:23:52 PM PDT by Marine Inspector
[ Post Reply | Private Reply | To 34 | View Replies]

To: all
bttt
36 posted on 04/30/2002 2:28:06 PM PDT by Registered
[ Post Reply | Private Reply | To 35 | View Replies]

To: HairOfTheDog
Bookmarked.
37 posted on 04/30/2002 2:29:01 PM PDT by SC Swamp Fox
[ Post Reply | Private Reply | To 16 | View Replies]

To: X-USAF
da nada
38 posted on 04/30/2002 2:47:20 PM PDT by Tree of Liberty
[ Post Reply | Private Reply | To 34 | View Replies]

To: Johnny Gage
This is a really interesting post.
39 posted on 04/30/2002 3:03:39 PM PDT by Jimbaugh
[ Post Reply | Private Reply | To 5 | View Replies]

To: MarkL
I'd have to disagree. A normal Trojan listens on a port, waiting for the hacker who sent it to you to connect. This is true of SubSeven, NetBus, BackOrifice, etc. Some of them post their IP to Usenet or send an email. Of course, you could write it so that it acts as a client and connects to a server, which is more typical of spyware-type Trojans. Once you have a TCP/IP connection, it doesn't really matter who contacted who, since the conversation is bidirectional.

In any case, you could solve this one by only allowing specific outbound ports, typically 20, 80, 110, and 119.

As for the ignorant masses who buy a router without knowing how to use it, I urge them to learn. Get the O'Reilly TCP/IP book and work through the examples on a Linux or Sun box.

40 posted on 04/30/2002 3:12:20 PM PDT by proxy_user
[ Post Reply | Private Reply | To 13 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-4041-45 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson